{"id":162,"date":"2017-02-24T13:44:47","date_gmt":"2017-02-24T13:44:47","guid":{"rendered":"https:\/\/perfectshare.net\/blog\/?p=162"},"modified":"2017-04-01T15:22:04","modified_gmt":"2017-04-01T15:22:04","slug":"5-greatest-it-security-concerns-facing-businesses-today-infographic","status":"publish","type":"post","link":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/","title":{"rendered":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC]"},"content":{"rendered":"<p><strong>&#8220;It&#8217;s not what you don&#8217;t know that kills you, it&#8217;s what you know for sure that ain&#8217;t true.&#8221; &#8211; Mark Twain<\/strong><\/p>\n<p>Isn&#8217;t that true&#8230;<\/p>\n<p>Assumption of security, is insecure. That sounds simple, right?<\/p>\n<p>How often, though, are we still thinking of security? Weekly? Monthly? Once, and then you&#8217;re done???<\/p>\n<p>At PerfectShare, we think about business and data security every single day. Not only is our application focused on securing your business data and file sharing, but also to help your secure business processes become even more so.<\/p>\n<p>Today we put together a great infographic to give you a red light on some of the most common, but also the greatest IT security concerns and threats facing your business today. And, if you find it valuable, give us a share!<\/p>\n<div align=center><a href=\"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/infographic-5-greatest-it-security-threats-facing-business-2017.png\"><img decoding=\"async\" src=\"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/infographic-5-greatest-it-security-threats-facing-business-2017-334x1024.png\" alt=\"5 Greatest IT Security Concerns Facing Businesses Today\" title=\"5 Greatest IT Security Concerns Facing Businesses Today\" class=\"fluid\" style=\"border:#aaa 3px solid\" \/><\/a><\/p>\n<p style=\"font-size:10px\">Click for a larger image<\/p>\n<p><strong>Embed This Image On Your Site<\/strong> (copy code below):<br \/>\n<textarea style=\"width:90%; height: 100px; padding: 0.5%;margin:5px 4%;background:#f2f2f2\" readonly=\"readonly\">&lt;div style=&#8221;clear:both&#8221;&gt;&lt;a href=&#8221;https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/infographic-5-greatest-it-security-threats-facing-business-2017.png&#8221;&gt;&lt;img src=&#8221;https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/infographic-5-greatest-it-security-threats-facing-business-2017-334&#215;1024.png&#8221; title=&#8221;5 Greatest IT Security Concerns Facing Businesses Today from PerfectShare.net&#8221; alt=&#8221;5 Greatest IT Security Concerns Facing Businesses Today from PerfectShare.net&#8221; border=&#8221;0&#8243; \/&gt;&lt;\/a&gt;&lt;\/div&gt;&lt;div&gt;Courtesy of: &lt;a href=&#8221;https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/&#8221;&gt;PerfectShare.net&lt;\/a&gt;&lt;\/div&gt;<\/textarea><\/div>\n<p><\/p>\n<h2>1 &#8211; Data Breaches<\/h2>\n<p>People are looking to collect mission critical, private and even completely irrelevant data from you.<\/p>\n<p>That &#8220;hunt&#8221; needs some safety via passwords primarily. Password issues cause multiple intrusions. People use the same passwords for every login, or they are so cavalier with password strength that &#8220;password123&#8221; seems like a <strong>great<\/strong> solution for speed.<\/p>\n<p>Beyond passwords, you can help strengthen your business security by enforcing HTTPS connections (data transit). Also, use secure storage facilities for data, files and parts of your process like databases and web servers.<\/p>\n<h2>2 &#8211; Social Networks<\/h2>\n<p>Remember when you would receive a few dozen emails a day with &#8220;screensavers&#8221; and links in them? Or a prince needing your help moving million; of which you could have half?<\/p>\n<p>These kinds of threats have now moved to social media. Posts fill your newsfeed that are hidden advertisements, phishing attacks and more. In fact items like <a href=\"http:\/\/www.cse.wustl.edu\/~jain\/\/cse571-11\/ftp\/social\/index.html\">identity theft and spam attacks occur in social networks<\/a> as well.<\/p>\n<p>What are the most common that you should be spotting to prevent your employees (and yourself) from being infected?<\/p>\n<ul>\n<li>Human error<\/li>\n<li>Duplicated login credentials<\/li>\n<li>Social scams<\/li>\n<li>Phishing attacks<\/li>\n<li>Malware attacks<\/li>\n<\/ul>\n<h2>3 &#8211; Mobile Devices (BYOD)<\/h2>\n<p>Allowing for mobile device usage (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\">Bring Your Own Device or BYOD<\/a>) and connecting to the business&#8217;s network and system makes sense. After all, we are growing as a civilization in the way we connect, work and play.<\/p>\n<p>There are benefits of using a BYOD policy including improved productivity, lower costs to the company and higher mobility in work. However, there are some risks including possible breaches of data, having to support multiple types of devices and not having full control of data on those devices.<\/p>\n<p>The smartest method of securing devices in the modern workplace is by using a BYOD Policy. Look at password protection, device registration, data limits and even using only company-owned devices on the network.<\/p>\n<h2>4 &#8211; Careless \/ Disgruntled Employees<\/h2>\n<p>Accidents can and do happen. However, there is a difference between a user being fully aware of issues while performing great maintenance on their accounts, and another just not caring until something bad happens.<\/p>\n<p>Likewise, there are employees (current and former) who just want to destroy, or blackmail, or hurt the company.<\/p>\n<p>In fact, according to a study conducted by Intel, <a href=\"http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-data-exfiltration.pdf\">43% of internal actors were responsible for data breaches<\/a>. Of those, half were because of carelessness or accident.<\/p>\n<h2>5 &#8211; Unpatched \/ Unpatchable Devices<\/h2>\n<p>To stay current on new attacks, viruses and security rules, you <strong><em>MUST<\/em><\/strong> update your devices and software.<\/p>\n<p>It is that simple&#8230;<\/p>\n<p>However, some businesses fall short on this threat. In fact, according to NET Market Share, <a href=\"https:\/\/www.netmarketshare.com\/operating-system-market-share.aspx?qprid=10&#038;qpcustomd=0\">9%+ of computers are still using Windows XP<\/a> as of January 2017. Think about the layers of security not being used. Think about the amount of possible threats just waiting to find this terminals. And what is worse, think about how many companies have private and potentially critical data on them, waiting for a hacker to come and grab it all&#8230;<\/p>\n<div align=center class=\"ctaofferelement\"><a href=\"http:\/\/perfectshare.net\/pricing?utm_campaign=itsecurityinfographic&#038;utm_source=website&#038;utm_medium=link\" class=\"blogctaoffer\">Signup For Your FREE PerfectShare Account<\/a><\/div>\n<p>Click above to try out our custom data sharing security solution. PerfectShare hits those simple, and not-so-simple security issues that you worry about, and replaces them with a little more comfort. Is your data safe? Want it to be?<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security concerns in business today. What are the 5 greatest IT security threats that your business might face? Free infographic &hellip; <a href=\"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":175,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,3],"tags":[],"class_list":["post-162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-productivity","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare\" \/>\n<meta property=\"og:description\" content=\"IT security concerns in business today. What are the 5 greatest IT security threats that your business might face? Free infographic &hellip; Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/\" \/>\n<meta property=\"og:site_name\" content=\"PerfectShare\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-24T13:44:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-01T15:22:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PerfectShare Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@perfectshareapp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PerfectShare Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/\"},\"author\":{\"name\":\"PerfectShare Writer\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/#\\\/schema\\\/person\\\/e423589413291c943c9efbcec6607a91\"},\"headline\":\"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC]\",\"datePublished\":\"2017-02-24T13:44:47+00:00\",\"dateModified\":\"2017-04-01T15:22:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/\"},\"wordCount\":781,\"image\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/it-security-threats-infographic.png\",\"articleSection\":[\"Productivity\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/\",\"url\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/\",\"name\":\"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/it-security-threats-infographic.png\",\"datePublished\":\"2017-02-24T13:44:47+00:00\",\"dateModified\":\"2017-04-01T15:22:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/#\\\/schema\\\/person\\\/e423589413291c943c9efbcec6607a91\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/it-security-threats-infographic.png\",\"contentUrl\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/it-security-threats-infographic.png\",\"width\":600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/5-greatest-it-security-concerns-facing-businesses-today-infographic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/\",\"name\":\"PerfectShare\",\"description\":\"Blog for the BEST in secure and simple file sharing and data sharing for any size business.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perfectshare.net\\\/blog\\\/#\\\/schema\\\/person\\\/e423589413291c943c9efbcec6607a91\",\"name\":\"PerfectShare Writer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g\",\"caption\":\"PerfectShare Writer\"},\"description\":\"PerfectShare is YOUR secure and simple method of business-level file sharing and collaboration.\",\"sameAs\":[\"https:\\\/\\\/perfectshare.net\",\"https:\\\/\\\/x.com\\\/@perfectshareapp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/","og_locale":"en_US","og_type":"article","og_title":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare","og_description":"IT security concerns in business today. What are the 5 greatest IT security threats that your business might face? Free infographic &hellip; Read More","og_url":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/","og_site_name":"PerfectShare","article_published_time":"2017-02-24T13:44:47+00:00","article_modified_time":"2017-04-01T15:22:04+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png","type":"image\/png"}],"author":"PerfectShare Writer","twitter_card":"summary_large_image","twitter_creator":"@perfectshareapp","twitter_misc":{"Written by":"PerfectShare Writer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#article","isPartOf":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/"},"author":{"name":"PerfectShare Writer","@id":"https:\/\/perfectshare.net\/blog\/#\/schema\/person\/e423589413291c943c9efbcec6607a91"},"headline":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC]","datePublished":"2017-02-24T13:44:47+00:00","dateModified":"2017-04-01T15:22:04+00:00","mainEntityOfPage":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/"},"wordCount":781,"image":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png","articleSection":["Productivity","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/","url":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/","name":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC] - PerfectShare","isPartOf":{"@id":"https:\/\/perfectshare.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#primaryimage"},"image":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png","datePublished":"2017-02-24T13:44:47+00:00","dateModified":"2017-04-01T15:22:04+00:00","author":{"@id":"https:\/\/perfectshare.net\/blog\/#\/schema\/person\/e423589413291c943c9efbcec6607a91"},"breadcrumb":{"@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#primaryimage","url":"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png","contentUrl":"https:\/\/perfectshare.net\/blog\/wp-content\/uploads\/2017\/02\/it-security-threats-infographic.png","width":600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/perfectshare.net\/blog\/5-greatest-it-security-concerns-facing-businesses-today-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perfectshare.net\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Greatest IT Security Concerns Facing Businesses Today [INFOGRAPHIC]"}]},{"@type":"WebSite","@id":"https:\/\/perfectshare.net\/blog\/#website","url":"https:\/\/perfectshare.net\/blog\/","name":"PerfectShare","description":"Blog for the BEST in secure and simple file sharing and data sharing for any size business.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perfectshare.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/perfectshare.net\/blog\/#\/schema\/person\/e423589413291c943c9efbcec6607a91","name":"PerfectShare Writer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c24c44c7a3b7f9711bf0b55308a5acb0fe97e5d90bc3afdd1aeb49276ee7d62?s=96&d=mm&r=g","caption":"PerfectShare Writer"},"description":"PerfectShare is YOUR secure and simple method of business-level file sharing and collaboration.","sameAs":["https:\/\/perfectshare.net","https:\/\/x.com\/@perfectshareapp"]}]}},"_links":{"self":[{"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/posts\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/comments?post=162"}],"version-history":[{"count":14,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/posts\/162\/revisions"}],"predecessor-version":[{"id":202,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/posts\/162\/revisions\/202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/media\/175"}],"wp:attachment":[{"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/media?parent=162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/categories?post=162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perfectshare.net\/blog\/wp-json\/wp\/v2\/tags?post=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}